Skip to main content

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 355))

  • 1165 Accesses

Abstract

The past security policy about public key management strongly relied on the key matrix which was preset by the base station or generated by the algorithm embedded in the nodes, then to exchange the public key with others to finish the security communications, but a lot of public keys were stored in the nodes, which consumed much energy and might be captured and gained by the attacked nodes. In this chapter, we adopt the bilinear pairing theory to the public key generation and management which does not require the public key in the nodes and applies the node’s information to the public keys, which may reduce the cost of managing the public keys and enhances the security of key management; then we propose a cluster key distributed scheme on the basis of clustering by using the bilinear pairing key management in the wireless sensor network and demonstrate its feasibility and security theoretically.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akyildiz IF, Su W, et al. Wireless sensor networks: a survey. Comput Netw. 2002;38(4):393–433.

    Article  Google Scholar 

  2. Pamo B, Perrig A, Gligor V. Distributed detection of node replication attacks in sensor networks. In: Proceedings of the IEEE symposium on security and privacy, vol. 8. IEEE Computer Society; 2005. pp. 49–63.

    Google Scholar 

  3. Perrig A, Szewczyk R, et al. SPINS: security protocols for sensor networks. Wirel Netw. 2002;8(5):521–34.

    Article  MATH  Google Scholar 

  4. Chan H, Perrig A, Song D. Key distribution techniques for sensor networks. Wirel Netw. 2004;6(2):277–303.

    Google Scholar 

  5. Shamir A. Identity-based cryptosystems and signature schemes. In: Proceedings of the CRYPTO 84 on Advances in Cryptology; Springer, New York; 1985. p. 47–53.

    Google Scholar 

  6. Boneh D, Franklin M. Identity-based encryption from the weil pairing. SIAM J Comput. 2003;32(3):586–615.

    Article  MathSciNet  MATH  Google Scholar 

  7. Liu DG, Ning P. Multi-level μTESLA: a broadcast authentication system for distributed sensor networks. ACM(TECS). 2004;3(4):800–36.

    MathSciNet  Google Scholar 

  8. Sahai A, Waters B. Fuzzy identity-based encryption. In: Advances in Cryptology-EUROCRYPT of Lecture Notes in Computer Science, vol. 3494; Springer, Berlin; 2005. p. 457–73.

    Google Scholar 

  9. Zhang F, Safavi Naini R, Susilo W. An efficient signature scheme from bilinear pairings and its applications. In: Practice and Theory in Public Key Cryptography-PKC, LNCS, vol. 2947; 2004. p. 277–90.

    Google Scholar 

Download references

Acknowledgements

This research was supported by No. 61103017 China National Foundations, No. CG1215 Lianyungang Science and Technology Project and No. SH1212 Lianyungang Social Development Project.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoming Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Liu, X., Zhao, Q. (2015). Cluster Key Scheme Based on Bilinear Pairing for Wireless Sensor Networks. In: Wong, W. (eds) Proceedings of the 4th International Conference on Computer Engineering and Networks. Lecture Notes in Electrical Engineering, vol 355. Springer, Cham. https://doi.org/10.1007/978-3-319-11104-9_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11104-9_35

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11103-2

  • Online ISBN: 978-3-319-11104-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics